In the HDF5 1.8.16 library's failure to check if the number of dimensions for an array read from the file is within the bounds of the space allocated for it, a heap-based buffer overflow will occur, potentially leading to arbitrary code execution.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DLA-771-1 | hdf5 security update |
![]() |
DSA-3727-1 | hdf5 security update |
![]() |
EUVD-2016-5330 | In the HDF5 1.8.16 library's failure to check if the number of dimensions for an array read from the file is within the bounds of the space allocated for it, a heap-based buffer overflow will occur, potentially leading to arbitrary code execution. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: certcc
Published:
Updated: 2024-08-06T00:25:14.493Z
Reserved: 2016-04-27T00:00:00
Link: CVE-2016-4330

No data.

Status : Deferred
Published: 2016-11-18T20:59:00.317
Modified: 2025-04-12T10:46:40.837
Link: CVE-2016-4330


No data.